Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp11884069rwl; Tue, 3 Jan 2023 06:11:38 -0800 (PST) X-Google-Smtp-Source: AMrXdXvzf45DdBW5wfE9eacZd3uIlhRXBSyZHf1Elcj+5Rfj9zLvhH+AEZcYoP071/wKCNSMQs+U X-Received: by 2002:a05:6402:378c:b0:483:b15a:3206 with SMTP id et12-20020a056402378c00b00483b15a3206mr29946523edb.23.1672755098480; Tue, 03 Jan 2023 06:11:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672755098; cv=none; d=google.com; s=arc-20160816; b=njxt+4mK8vSH2uAjKl3k6g8v0Q0dxcI8+5MDGmk62gkZt5de5pBcAl7oRmxeJ1BPtI 9LMbpV+Gfh/KLYrL56qla2k5AkDJ3wK0iaH8I7kj/63bVKbL8pu5UKE0UZctGby/teU8 jjQNyYfMysRdQ0Dv6t3BJJiWgHRTF664pNZk5gKMtYJubDQvSJ4nMvdea3F2ECEvszV7 fNsyeHtRmDlKlFxxd7Mg2y22nzVc5g2DZZ+ChYvj32MuFA5PV8i3SccZuwYN8MLupjCb xlyqhkzgWjcoql+J/EU85hk2YjBkMyi2NCTl/ABWf/QZ6Zen0NrxZi47BD9yUM95Hobm 9Zsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=ucssb65txyENbyaOBHFqS29fHGTTzI6kVf5XtyK6ClA=; b=xKiamGwGGrot0IOKGTa8U1TE9xga96A+6cZxBPc26kESvbSewvd87G7GH4SYRkyrBu GLyzupjJoTwqKpSfZpKYIfuAc2DQqmoXkVXjpiiol22k8jMFVDuqGpNeJCowegP8hEpc 2Tz/77u7Na6cpBIc1ftHjj1zlOghmVHJRWyqenM9dgnY/yEhIM48pHFs+NTUqB1YdYGj DTmXQKC9EJ88mcEge9nqmiszBf5dSYTrik6QGA9XWlAykO1I9q28mAUOtQOKdvGSKKZi RgkyoEWvJGUQEKojS+SSpXRiPgBVSzsxrZuLLwDrojKNUZsp/99ONEI1uDAwO6D8WmTM mdVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=j2gI5dyi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q9-20020a056402518900b0048d42f6970bsi8331325edd.252.2023.01.03.06.11.24; Tue, 03 Jan 2023 06:11:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=j2gI5dyi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237781AbjACOIs (ORCPT + 60 others); Tue, 3 Jan 2023 09:08:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56330 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237778AbjACOIh (ORCPT ); Tue, 3 Jan 2023 09:08:37 -0500 Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [185.132.182.106]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F40D610F3; Tue, 3 Jan 2023 06:08:35 -0800 (PST) Received: from pps.filterd (m0241204.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3039ZHAJ014931; Tue, 3 Jan 2023 15:08:05 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=selector1; bh=ucssb65txyENbyaOBHFqS29fHGTTzI6kVf5XtyK6ClA=; b=j2gI5dyik7mgWgmhN4EwolScVdhAKmP+ZRKafSFm25hDYEI5jBt2FerTD5Hk1gAJ7IwJ 8rpNtq0SsST56ieqBU9Dps2phFY9QsdjpkNciUCD4nfiXHxQZPShJYLc8ZT6PYlMNlN/ MXnS6eMa8wN4gU2zO4a6hcCbrXOqP4hBX1LnGtIFNL+JSSVUstYeNLlrev9yazsU7y4J udxdy0PNq6X+6SNace8n1PkXtU3CEW4jfnhCLIF64OHS7yQjVJSolvx/aERsNYVTSW9n 7w+8HM9+9V6+45NdYZe0J7FLCPNX5Wf2/iFWI4hxaa/GgsX0ae3F3/Tjib+5J+cDX6he Zg== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com (PPS) with ESMTPS id 3mtda658p3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 03 Jan 2023 15:08:05 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 1A81210002A; Tue, 3 Jan 2023 15:08:05 +0100 (CET) Received: from Webmail-eu.st.com (shfdag1node3.st.com [10.75.129.71]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 12A97224401; Tue, 3 Jan 2023 15:08:05 +0100 (CET) Received: from localhost (10.48.0.157) by SHFDAG1NODE3.st.com (10.75.129.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.13; Tue, 3 Jan 2023 15:08:04 +0100 From: Patrick Delaunay To: Alexandre TORGUE , Rob Herring , Krzysztof Kozlowski , Maxime Coquelin CC: Lionel DEBIEVE , Amelie DELAUNAY , Etienne CARRIERE , Fabrice GASNIER , Patrick Delaunay , , , , Subject: [PATCH v4 1/3] ARM: dts: stm32mp13: fix compatible for BSEC Date: Tue, 3 Jan 2023 15:05:19 +0100 Message-ID: <20230103150515.v4.1.I167a5efc1f8777cce14518c6fa38400ac684de3e@changeid> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230103140521.187678-1-patrick.delaunay@foss.st.com> References: <20230103140521.187678-1-patrick.delaunay@foss.st.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.48.0.157] X-ClientProxiedBy: SHFCAS1NODE2.st.com (10.75.129.73) To SHFDAG1NODE3.st.com (10.75.129.71) X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2023-01-03_04,2023-01-03_02,2022-06-22_01 X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use the correct compatible for stm32mp13 support. The BSEC driver for STM32MP15x is not compatible with STM32MP13x. For example the proprietary's smc STM32_SMC_BSEC is not supported in STM32MP13x OP-TEE, it is replaced by SM32MP BSEC Pseudo Trusted Application in OP-TEE to access to the secured IP BSEC on STM32MP13X SoC. The correct compatible is already used in U-Boot and in upstream is in progress for OP-TEE device tree. As the SoC STM32MP13X is not yet official and it is not available outside STMicroelectronics, it is the good time to break the DTS compatibility and to correct the error done in the introduction of STM32MP131. Signed-off-by: Patrick Delaunay --- This patch is already sent separately in: https://lore.kernel.org/all/20221017134437.1.I167a5efc1f8777cce14518c6fa38400ac684de3e@changeid/ https://patchwork.kernel.org/project/linux-arm-kernel/list/?series=685815 I create a serie for more efficient review. Patrick. (no changes since v1) Changes in v1: - update commit message to indicate DTS break reason. arch/arm/boot/dts/stm32mp131.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm/boot/dts/stm32mp131.dtsi b/arch/arm/boot/dts/stm32mp131.dtsi index accc3824f7e9..0b79380cc627 100644 --- a/arch/arm/boot/dts/stm32mp131.dtsi +++ b/arch/arm/boot/dts/stm32mp131.dtsi @@ -520,7 +520,7 @@ rtc: rtc@5c004000 { }; bsec: efuse@5c005000 { - compatible = "st,stm32mp15-bsec"; + compatible = "st,stm32mp13-bsec"; reg = <0x5c005000 0x400>; #address-cells = <1>; #size-cells = <1>; -- 2.25.1